24Mar
Be Wary of All Factors Affecting Potential Exposure in Software Audits
Most businesses that try to plan for software audits and to estimate the potential exposure they could incur in the event of those audits know that the primary cost components of that exposure typically are...
4Feb
Be Wary of Requests for Mystery Data
Software auditors such as KPMG, Deloitte and PriceWaterhouseCoopers like to have things their way. It’s an understandable impulse – with likely hundreds of audits pending at any one time, the natural inclination is to standardize...
14Jan
How to respond to a VMware Audit
Managing a complex IT environment very challenging, even before becoming involved in an external software audit from a software publisher or a third-party auditing entity. Businesses facing VMWare audits in particular should be prepared to...
11Jan
Software Audits: Proving Ownership of Software Licenses
Often the single most arduous and time-consuming task facing companies who are the subject of software audits is collecting entitlement information to prove ownership of licenses for software installed on its networks. Once a company...
30Dec
Managing Audits to Prevent Unauthorized Disclosures by Technology Teams
Disputes involving software usage are on the rise for businesses of all sizes. In some cases, technical teams respond to a software publisher’s or a third party’s audit request and provide significant amounts of data...
14Dec
General Counsel Should be Aware of Disguised Software Audit Clauses
Software license agreements often contain clauses allowing the licensor to review books and records, “Books and Records” clauses. These are often boilerplate clauses included in license agreements without much consideration from the contracting parties. When...